Malware Development for Ethical Hackers. Learn how to develop various types of malware to strengthen cybersecurity - Helion
Tytuł oryginału: Malware Development for Ethical Hackers. Learn how to develop various types of malware to strengthen cybersecurity
ISBN: 9781801076975
stron: 390, Format: ebook
Data wydania: 2024-06-28
Księgarnia: Helion
Cena książki: 149,00 zł
Malware Development for Ethical Hackers is a comprehensive guide to the dark side of cybersecurity within an ethical context.
This book takes you on a journey through the intricate world of malware development, shedding light on the techniques and strategies employed by cybercriminals. As you progress, you’ll focus on the ethical considerations that ethical hackers must uphold. You’ll also gain practical experience in creating and implementing popular techniques encountered in real-world malicious applications, such as Carbanak, Carberp, Stuxnet, Conti, Babuk, and BlackCat ransomware. This book will also equip you with the knowledge and skills you need to understand and effectively combat malicious software.
By the end of this book, you'll know the secrets behind malware development, having explored the intricate details of programming, evasion techniques, persistence mechanisms, and more.
Osoby które kupowały "Malware Development for Ethical Hackers. Learn how to develop various types of malware to strengthen cybersecurity", wybierały także:
- Windows Media Center. Domowe centrum rozrywki 66,67 zł, (8,00 zł -88%)
- Ruby on Rails. Ćwiczenia 18,75 zł, (3,00 zł -84%)
- Przywództwo w świecie VUCA. Jak być skutecznym liderem w niepewnym środowisku 58,64 zł, (12,90 zł -78%)
- Scrum. O zwinnym zarządzaniu projektami. Wydanie II rozszerzone 58,64 zł, (12,90 zł -78%)
- Od hierarchii do turkusu, czyli jak zarządzać w XXI wieku 58,64 zł, (12,90 zł -78%)
Spis treści
Malware Development for Ethical Hackers. Learn how to develop various types of malware to strengthen cybersecurity eBook -- spis treści
- 1. A Quick Introduction to Malware Development
- 2. Exploring Various Malware Injection Attacks
- 3. Mastering Malware Persistence Mechanisms
- 4. Mastering Privilege Escalation on Compromised Systems
- 5. Anti-Debugging Tricks
- 6. Navigating Anti-Virtual Machine Strategies
- 7. Strategies for Anti-Disassembly
- 8. Navigating the Antivirus Labyrinth – a Game of Cat and Mouse
- 9. Exploring Hash Algorithms
- 10. Simple Ciphers
- 11. Unveiling Common Cryptography in Malware
- 12. Advanced Math Algorithms and Custom Encoding
- 13. Classic Malware Examples
- 14. APT and Cybercrime
- 15. Malware Source Code Leaks
- 16. Ransomware and Modern Threats